Application Security

Application Security | News, how-tos, features, reviews, and videos

Faraday_Blackhat2017
video

Simple tips to keep your devices secure when you travel

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday...

The dark web's changed
video

How the dark web has gone corporate

Some criminals on the dark web are taking their cues from the practices of corporate IT. Illicit offerings run the gamut from code that buyers have to implement themselves to turnkey solutions and consulting services.

Blackhat_2017
video

How DevOps and cloud will speed up security

Zane Lackey, CSO and co-founder of Signal Sciences, talks with CSO senior writer Fahmida Rashid about how DevOps and cloud can help organizations embed security into their technology structures, enabling business to move faster.

Blackhat_2017
video

Stop blaming users for security misses

Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer...

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Software vendors will fix these vulnerabilities, but users should remember that there are always zero-day exploits out there

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do

whisper shh quiet mouth lips men antique vintage secret

Got secrets? Docker Datacenter can help your applications keep them

Docker Datacenter now supports secrets in containerized apps -- API keys, passwords, and encryption keys -- and ensures they are securely stored and transmitted

apple ios

Dozens of iOS apps fail to secure users' data, researcher says

The developers have misconfigured the apps to accept invalid TLS certificates, says the security researcher who detected the app vulnerabilities

machine learning

AI isn't for the good guys alone anymore

Criminals are beginning to use artificial intelligence and machine learning to get around cyberdefenses

heartbleed illustration

That Hearbleed problem may be more pervasive than you think

The 200,000 devices with the OpenSSL Heartbleed vulnerability may include commercial software you are running

defenses against super attackes 1

Cisco scrambling to fix a remote code execution problem in WebEx

There’s no workaround and no final patch for a critical bug that can open up users’ computers to remote code execution attacks

apple 1839363

Apple quashes bugs in iOS, MacOS, and Safari

Fixes new MacBook Pro's graphics problems with software update

Android apps (2)

Google pushed developers to fix security flaws in 275,000 Android apps

Over 90,000 developers acted based on alerts issued through the Google Play App Security Improvement program

oracle cloud on building

Oracle patches raft of vulnerabilities in business applications

The company's quarterly patch update includes a total of 270 security fixes for many products

adobe systems headquarters san jose

Adobe patches critical flaws in Flash Player, Reader, and Acrobat

Adobe Systems released security updates for its Flash Player, Adobe Reader and Acrobat products fixing critical vulnerabilities that could allow attackers to install malware on computers.

code programming software bugs cybersecurity

This tool can help weed out hard-coded keys from software projects

Truffle Hog can find access tokens and keys that are 20 characters or longer inside source code repositories

ransomware data laptop

MongoDB ransomware attacks sign criminals are going after servers, applications

Ransomware is lucrative, and attackers looking for new ways to extort enterprises are going after data stored on web and app servers, even SaaS apps

bug bounty

Why companies offer a hacking bounty -- and why there are challenges

Major companies like Apple, Uber, and Yelp regularly offer bounties -- some as high as $200,000 -- but there can be drawbacks

ransomware data laptop

Exposed MongoDB installs being erased, held for ransom

Administrators should check their MongoDB deployments before they’re wiped clean

Android statues

Remote management app exposes millions of Android users to hacking

Man-in-the-middle attackers could exploit an AirDroid flaw to execute malicious code on devices

Load More
You Might Also Like